I recently gave my first in-person lecture in almost two years since the
pandemic began, and it was such a great experience.
I talked about attacks and fixes for distributed key generation (DKG)
I was invited to present FROST and to give recommendations for the
standardization of Schnorr threshold signatures at the recent NIST workshop on
standardization of threshold schemes
[https://csrc.nist.gov/Events/2020/
I am excited to say that the camera ready version of our publication "Mind the
Gap: Ceremonies for Applied Secret Sharing" in the Privacy Enhancing Symposium
2020 is out!
You can
Important Terms and Notation
For the purposes of this post, it is important to understand a few basic
notation and terms. We define further linear algebra terms inPart 1
[https://writing.chelseakomlo.com/
This post gives a (hopefully!) simple introduction to lattices and hard problems based on lattices. In Part 2, we’ll look at one simple lattice-based key exchange, to understand how to use these underlying hard problems in cryptosystems.